Improper Verification of Cryptographic Signature Affecting github.com/kyverno/kyverno/pkg/cosign package, versions <1.14.0-alpha.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMKYVERNOKYVERNOPKGCOSIGN-9513020
  • published25 Mar 2025
  • disclosed24 Mar 2025
  • creditfrgt10cs

Introduced: 24 Mar 2025

NewCVE-2025-29778  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade github.com/kyverno/kyverno/pkg/cosign to version 1.14.0-alpha.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in the matchSignatures() function in cosign.go, which does not check for subjectRegExp or issuerRegExp values during artifact signature verification. An attacker can deploy unauthorized Kubernetes resources. This is only exploitable if the attacker has access to a private key of any certificate in the certificate chain trusted by cosign, access to a container registry to push artifact images, and permissions to deploy artifacts.

CVSS Base Scores

version 4.0
version 3.1